Technology

“‘Industry is behind the curve right now with cyber defense not keeping pace with offense,’ says Matt Devost, managing director at Accenture Security and frequent adviser to the government on cyber security issues. ‘We have a shortage of human capital, so we don’t have enough skilled people to engage in

“How can Ethereum be a cryptocurrency and a computer at the same time? Instead of running on a laptop or a server, it runs on thousands of individual computers at once, all kept in sync with blockchain technology. In its simplest form, a blockchain is an ordered list of items

“A team of researchers from the University of Washington in Seattle have demonstrated the first successful DNA-based exploit of a computer system that executes the malicious code written into the synthesised DNA strands while reading it.” Source: Malware Encoded Into DNA Hacks the Computer that Reads It

“The US believes several State Department employees at the US embassy in Havana were subjected to an ‘acoustic attack’ using sonic devices that left at least two with such serious health problems they needed to be brought back to the US for treatment, several senior State Department officials told CNN.

“A company co-owned by one of President Vladimir Putin’s internet advisers plans to raise the cryptocurrency equivalent of as much as $100 million in a push to help Russian entrepreneurs challenge China in bitcoin mining. Russian Miner Coin is holding a so-called initial coin offering, where investors will use units

“The risk of cyber attacks targeting ships’ satellite navigation is pushing nations to delve back through history and develop back-up systems with roots in World War Two radio technology. Ships use GPS (Global Positioning System) and other similar devices that rely on sending and receiving satellite signals, which many experts

“Beyond bitcoin payments and remittances, blockchain exists largely in the pilot stage. Governments and banks are collaborating with technology firms to see if it can be used to solve persistent problems like traceability, identification, and trust. Let’s move beyond hypotheticals to see how blockchain technology is being experimented in some

“But there’s a hidden cost, Meyersson says. Espionage seems to ‘eat up’ investment in research and development. For example, the authors’ model showed that increases in industrial espionage significantly reduced patent applications, a key proxy for research and development. ‘It’s a way to keep up,’ Meyersson says. ‘It’s not a

“The Department of Homeland Security is enlisting American college students in its efforts to stop the radicalization and recruitment of young people, mostly immigrants, by foreign terrorist groups. Under a program called Peer to Peer: Challenging Extremism, students at dozens of universities are given a budget of up to $2,000

“As of today, when users search for hateful content on YouTube using certain keywords, the platform will return playlists comprising content that debunks violent and extremist rhetoric. The new feature, dubbed The Redirect Method, is part of a four-prong strategy announced by Google last month to quash extremist ideologies across its